Vulnerability: Page 12
-
DigitalOcean, caught in Mailchimp security incident, drops email vendor
An attack on the email marketing firm raises questions about the continued risk of a supply chain compromise.
By David Jones • Aug. 17, 2022 -
The same old problems nag cybersecurity professionals
Technical complexities abound as the perceived level of risk rises in an unrelenting fashion.
By Matt Kapko • Aug. 17, 2022 -
How attackers are breaking into organizations
Threat actors lean heavily on phishing attacks, vulnerabilities in software and containers, and stolen credentials, according to top cyber vendor research.
By Matt Kapko • Aug. 15, 2022 -
Log4j was the right incident for inaugural review, safety board says
The Cyber Safety Review Board worked with 80 different global stakeholders to better understand the Log4j incident — and its downstream potential.
By David Jones • Aug. 11, 2022 -
Businesses boost software supply chain security, but strategies remain fragmented
A study by the Enterprise Strategy Group shows more than one-third of organizations have been exploited by a known open source vulnerability.
By David Jones • Aug. 9, 2022 -
Twitter vulnerability risk resurfaces, testing the security of pseudonymous users
A threat actor learned of the vulnerability, which allowed an account identity to be exposed by entering a simple email or phone number.
By David Jones • Aug. 8, 2022 -
Slack resets passwords en masse after invite link vulnerability
The bug, which went undetected for five years, impacts at least 60,000 users but likely more.
By Matt Kapko • Aug. 5, 2022 -
VMware discloses new authentication bypass vulnerability
The virtualization giant advised customers to immediately deploy patches and said it’s not aware of any exploitation in the wild.
By Matt Kapko • Aug. 2, 2022 -
Most cyberattacks come from ransomware, email compromise
Attackers are scanning for vulnerabilities in unpatched systems within 15 minutes, stressing the pace and scale of the threat.
By Matt Kapko • Aug. 1, 2022 -
Threat actors shifting tactics as Microsoft blocks, unblocks and reblocks macros
Proofpoint researchers say criminal hackers are turning to container files and Windows shortcuts to distribute malware.
By David Jones • July 29, 2022 -
Relentless vulnerabilities and patches induce cybersecurity burnout
Cybersecurity professionals are confronting a chronic vulnerability-patch cycle and the situation is getting worse.
By Matt Kapko • July 26, 2022 -
Google backs federal review board's Log4j, open source security push
The technology firm said it will continue investments and engage in more secure software practices to help prevent a future crisis similar to Log4j.
By David Jones • July 25, 2022 -
Atlassian urges rapid response after Confluence hardcoded password leaked
The company's customers are confronting the second critical vulnerability on Confluence in as many months.
By Matt Kapko • July 22, 2022 -
Network vulnerabilities declined in 2021, but attacks hit all-time high
Five of the 10 most-exploited vulnerabilities last year were identified before 2020, and No. 3 dates back to 2017.
By Matt Kapko • July 22, 2022 -
CISA releases indicators of compromise for hard-hit VMware Horizon
Federal authorities warn a more complex form of malware is providing advanced persistent threat actors with vast command and control capabilities.
By Matt Kapko • July 18, 2022 -
Fake GitHub commits can trick developers into using malicious code
Threat actors can easily alter the identity and timestamp associated with software updates, putting developers at serious risk, Checkmarx research shows.
By Matt Kapko • July 18, 2022 -
Log4j is far from over, cyber review board says
Exploitation of Log4j occurred at lower levels than experts predicted, yet it remains an "endemic vulnerability," the Cyber Safety Review Board said.
By Naomi Eide • July 14, 2022 -
Threat actors favor brute force attacks to hit cloud services
Google Cloud warned that organizations face their greatest threat due to weak passwords and vulnerable software.
By Matt Kapko • July 12, 2022 -
Microsoft rollback on macro blocking in Office sows confusion
The company said it remains "fully committed" to disabling macros by default, and the temporary measure will make the product more user friendly.
By David Jones • July 11, 2022 -
What to watch with 5G network security
For wireless network carriers, 5G is a model of what’s next. But it also introduces features and services that dramatically expand the threat surface.
By Matt Kapko • July 8, 2022 -
Apple's coming security features an answer to government-backed spyware
While some mobile security experts hail Lockdown Mode as a breakthrough, others warn the features will not extend to third-party apps.
By David Jones • July 7, 2022 -
Federal authorities warn MedusaLocker ransomware targeting remote desktop vulnerabilities
The ransomware as a service group began targeting healthcare and other industries in 2019. In recent months, activity has surged once again.
By David Jones • July 1, 2022 -
Organizations lag on confidence and policies to manage open source security
It's taking longer for companies to find open source vulnerabilities, and shaky policies mean only the most critical vulnerabilities are attended to.
By David Jones • June 24, 2022 -
Attackers keep targeting VMware Horizon, exploiting unpatched Log4Shell
In one case, CISA found multiple threat actors compromising an organization using Log4Shell, which leveraged access to gain remote command and control.
By Naomi Eide • June 24, 2022 -
Dozens of vulnerabilities threaten major OT device makers
Researchers from Forescout’s Vedere Labs found 56 vulnerabilities across big names like Honeywell and Motorola raising design-level security concerns.
By David Jones • June 21, 2022